Publications

Search
Export 3363 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
V
Krishna A, Schmidt D, Memon AM, Porter A, Sevilla D.  2004.  Validating quality of service for reusable software via model-integrated distributed continuous quality assurance. Software Reuse: Methods, Techniques, and Tools. :286-295.
Krishna A, Schmidt D, Memon AM, Porter A, Sevilla D.  2004.  Validating quality of service for reusable software via model-integrated distributed continuous quality assurance. Software Reuse: Methods, Techniques, and Tools. :286-295.
Ray A, Morschhaeuser I, Ackermann C, Cleaveland R, Shelton C, Martin C.  2009.  Validating Automotive Control Software Using Instrumentation-Based Verification. Automated Software Engineering, International Conference on. :15-25.
U
Au TC, Nau DS, V.S. Subrahmanian.  2004.  Utilizing volatile external information during planning. Proceedings of the European Conference on Artificial Intelligence (ECAI). :647-651.
Plishker W, Dandekar O, Bhattacharyya SS, Shekhar R.  2010.  Utilizing Hierarchical Multiprocessing for Medical Image Registration. IEEE Signal Processing Magazine. 27(2):61-68.
Chajewska U, Getoor L, Norman J, Shahar Y.  1998.  Utility elicitation as a classification problem. Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence. :79-88.
Plaisant C, Chintalapani G, Lukehart C, Schiro D, Ryan J.  2003.  Using Visualization Tools to Gain Insight Into Your Data. SPE Annual Technical Conference and Exhibition.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Using vision to think. Readings in information visualization: using vision to think. :579-581.
Schwartz M, Gupta SK, Anand DK, Brough JE, Kavetsky R.  2007.  Using virtual demonstrations for creating multi-media training instructions.
Sarcia' S A, Basili VR, Cantone G.  2009.  Using uncertainty as a model selection and comparison criterion. Proceedings of the 5th International Conference on Predictor Models in Software Engineering. :18:1–18:9-18:1–18:9.
Asahi T, Turo D, Shneiderman B.  1995.  Using Treemaps to Visualize the Analytic Hierarchy Process. Information Systems ResearchInformation Systems Research. 6(4):357-375.
Pop M, Kosack D.  2004.  Using the TIGR Assembler in Shotgun Sequencing Projects. Bacterial Artificial Chromosomes. 255:279-294.
Bhattacharyya SS, Shen C-C, Plishker W, Sane N, Zaki G.  2011.  Using the DSPCAD Integrative Command-Line Environment: User's Guide for DICE Version 1.1. Technical Reports from UMIACS.
Bhattacharyya SS, Shen C-C, Plishker W, Sane N, Zaki G.  2011.  Using the DSPCAD Integrative Command-Line Environment: User's Guide for DICE Version 1.1. Technical Reports from UMIACS.
Snelick R, JaJa JF, Kacker R, Lyon G.  1993.  Using Synthetic-Perturbation Techniques for Tuning Shared Memory Programs. Parallel Processing, 1993. ICPP 1993. International Conference on. 2:2-10.
Snelick R, JaJa JF, Kacker R, Lyon G.  1995.  Using synthetic perturbations and statistical screening to assay shared-memory programs. Information processing letters. 54(3):147-153.
Reisner E, Song C, Ma KK, Foster JS, Porter A.  2010.  Using symbolic evaluation to understand behavior in configurable software systems. Software Engineering, 2010 ACM/IEEE 32nd International Conference on. 1:445-454.
Perer A, Shneiderman B, Oard D.  2006.  Using rhythms of relationships to understand e‐mail archives. Journal of the American Society for Information Science and Technology. 57(14):1936-1948.
Getoor L, Sahami M.  1999.  Using probabilistic relational models for collaborative filtering. Proc. Workshop Web Usage Analysis and User Profiling (WEBKDD’99).
Spring N, Peterson L, Bavier A, Pait V.  2006.  Using PlanetLab for network research. ACM SIGOPS Operating Systems Review. 40:17-17.
Eaton E, desJardins M, Stevenson J.  2007.  Using multiresolution learning for transfer in image classification. Proceedings of the 22nd national conference on Artificial intelligence - Volume 2. :1852-1853.
Hochheiser H, Shneiderman B.  1999.  Using Interactive Visualizations of WWW Log Data to Characterize Access Patterns and Inform Site Design. Institute for Systems Research Technical Reports.
Hochheiser H, Shneiderman B.  2001.  Using interactive visualizations of WWW log data to characterize access patterns and inform site design. Journal of the American Society for Information Science and Technology. 52(4):331-343.
Tahmoush D, Samet H.  2006.  Using image similarity and asymmetry to detect breast cancer. Proc. of SPIE Vol. 6144:61441S–1-61441S–1.
Song Z, Roussopoulos N.  2002.  Using Hilbert curve in image storing and retrieving. Information Systems. 27(8):523-536.

Pages